search for: syslog_level_info

Displaying 20 results from an estimated 31 matches for "syslog_level_info".

2001 Jul 05
1
OpenSSH Logging Madness
...dd a new LogLevel corresponding to the LOG_NOTICE syslog level. - Then modify OpenSSH to log to LOG_NOTICE only these events: - login failures - login successes Specifically, please: - add a new element to the LogLevel enum, say, 'SYSLOG_LEVEL_NOTICE', between 'SYSLOG_LEVEL_INFO' and 'SYSLOG_LEVEL_ERROR', in log.h - add a new logging function to log.c called notice(), much like log(), verbose() and friends, but logging to SYSLOG_LEVEL_NOTICE. - modify log.c:do_log() to map SYSLOG_LEVEL_NOTICE to LOG_NOTICE. - modify auth.c:/auth_log() to use notice() i...
2001 Jan 05
3
subject: ssh non-intuitive logging setting. (priority names)
...LogLevel val; } log_levels[] = { { "QUIET", SYSLOG_LEVEL_QUIET }, { "FATAL", SYSLOG_LEVEL_FATAL }, { "ERROR", SYSLOG_LEVEL_ERROR }, { "INFO", SYSLOG_LEVEL_INFO }, { "VERBOSE", SYSLOG_LEVEL_VERBOSE }, { "DEBUG", SYSLOG_LEVEL_DEBUG1 }, { "DEBUG1", SYSLOG_LEVEL_DEBUG1 }, { "DEBUG2", SYSLOG_LEVEL_DEBUG2 }, { "DEBUG3&quot...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...sh-3.5p1-orig/log.c openssh-3.5p1/log.c --- openssh-3.5p1-orig/log.c 2002-12-18 10:10:13.000000000 -0500 +++ openssh-3.5p1/log.c 2002-12-18 11:51:24.000000000 -0500 @@ -40,6 +40,7 @@ #include "xmalloc.h" #include <syslog.h> +#include <time.h> static LogLevel log_level = SYSLOG_LEVEL_INFO; static int log_on_stderr = 1; @@ -48,6 +49,8 @@ extern char *__progname; +FILE *logf; + /* textual representation of log-facilities/levels */ static struct { @@ -261,7 +264,8 @@ */ void -log_init(char *av0, LogLevel level, SyslogFacility facility, int on_stderr) +log_init(char *av0,...
2001 Apr 12
1
ssh's readconf.c debug() goes to /dev/null
...ebug("Reading configuration data %.200s", filename); --- Goes to /dev/null. This is caused by the fact, that in ssh.c there is: --- /* * Initialize "log" output. Since we are the client all output * actually goes to stderr. */ ==> log_init(av[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1); /* Read per-user configuration file. */ snprintf(buf, sizeof buf, "%.100s/%.100s", pw->pw_dir, _PATH_SSH_USER_CONFFILE); read_config_file(buf, host, &options); /* Read systemwide configuration file. */ read_config...
2013 Jan 04
16
[Bug 2057] New: ssh should treat "Received disconnect" messages as errors
https://bugzilla.mindrot.org/show_bug.cgi?id=2057 Bug ID: 2057 Summary: ssh should treat "Received disconnect" messages as errors Classification: Unclassified Product: Portable OpenSSH Version: -current Hardware: All OS: All Status: NEW Severity: minor Priority:
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
...int noclose); + #endif /* _BSD_DAEMON_H */ diff -c -r openssh-2.2.0p1/sshd.c openssh-2.2.0p1-pen1/sshd.c *** openssh-2.2.0p1/sshd.c Tue Aug 29 02:05:50 2000 --- openssh-2.2.0p1-pen1/sshd.c Thu Jan 4 23:30:46 2001 *************** *** 552,558 **** log_init(av0, options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level, options.log_facility == -1 ? SYSLOG_FACILITY_AUTH : options.log_facility, ! !silent && !inetd_flag); /* Read server configuration options from the configuration file. */ read_server_config(&options, config_file_name); --- 552,558 ---- log_ini...
2001 Feb 12
0
log-server.c patch: adding tag to every log output.
...turn; switch (level) { - case SYSLOG_LEVEL_ERROR: - txt = "error"; - pri = LOG_ERR; - break; case SYSLOG_LEVEL_FATAL: ! txt = "fatal"; pri = LOG_ERR; break; case SYSLOG_LEVEL_INFO: case SYSLOG_LEVEL_VERBOSE: pri = LOG_INFO; break; case SYSLOG_LEVEL_DEBUG1: ! txt = "debug1"; pri = LOG_DEBUG; break; ! case SYSLOG_LEVEL_DEBUG2: ! txt = "debug2";...
2016 Dec 28
2
certificates keys on pkcs11 devices
Hi, I have not found any way to use a Certificate with ssh-agent when my Key is stored on a pkcs11 device. I can add my key with ssh-add -s /usr/local/lib/opensc-pkcs11.so but ssh-add -s /usr/local/lib/opensc-pkcs11.so ~/.ssh/mykey-cert.pub does not add the certificate to my agent. As far as I undestand, in ssh-add.c line 580 if (pkcs11provider != NULL) { if (update_card(agent_fd,
2018 Nov 19
2
[PATCH] openssl-compat: Test for OpenSSL_add_all_algorithms before using.
OpenSSL 1.1.0 has deprecated this function. --- configure.ac | 1 + openbsd-compat/openssl-compat.c | 2 ++ openbsd-compat/openssl-compat.h | 4 ++++ 3 files changed, 7 insertions(+) diff --git a/configure.ac b/configure.ac index 3f7fe2cd..db2aade8 100644 --- a/configure.ac +++ b/configure.ac @@ -2710,6 +2710,7 @@ if test "x$openssl" = "xyes" ; then ])
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
...;t specify both -y and -E"); - if (logfile != NULL) - log_redirect_stderr_to(logfile); + if (options.log_path != NULL) + log_redirect_stderr_to(options.log_path); log_init(argv0, options.log_level == SYSLOG_LEVEL_NOT_SET ? SYSLOG_LEVEL_INFO : options.log_level, -- 2.39.2
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...break; case 'i': inetd_flag = 1; break; *************** *** 706,719 **** /* * Force logging to stderr until we have loaded the private host ! * key (unless started from inetd) */ log_init(__progname, options.log_level == SYSLOG_LEVEL_NOT_SET ? SYSLOG_LEVEL_INFO : options.log_level, options.log_facility == SYSLOG_FACILITY_NOT_SET ? SYSLOG_FACILITY_AUTH : options.log_facility, ! !inetd_flag); #ifdef _CRAY /* Cray can define user privs drop all prives now! --- 713,726 ---- /* * Force logging to stderr until we have loaded...
2009 Feb 13
2
when to display a banner
...{ char *msg, *raw, *lang; u_int len; debug3("input_userauth_banner"); + if (!isatty(1) || !isatty(2)) return; raw = packet_get_string(&len); lang = packet_get_string(NULL); if (options.log_level >= SYSLOG_LEVEL_INFO) { what i think this will accomplish is that if one of the ssh client programs is called normally by a user, the banner will be displayed. if however either stdout or stderr is redirected like you would do in an automated script, the banner will be suppressed. can anyone think of any unintended s...
2003 Sep 10
3
[PATCH] No extern declarations of optarg & co if getopt.h is available
...===== RCS file: /cvs/openssh_cvs/sftp.c,v retrieving revision 1.38 diff -p -u -r1.38 sftp.c --- sftp.c 21 Aug 2003 23:34:41 -0000 1.38 +++ sftp.c 10 Sep 2003 18:59:00 -0000 @@ -129,8 +129,10 @@ main(int argc, char **argv) char *ssh_program = _PATH_SSH_PROGRAM, *sftp_direct = NULL; LogLevel ll = SYSLOG_LEVEL_INFO; arglist args; +#ifndef HAVE_GETOPT_H extern int optind; extern char *optarg; +#endif __progname = ssh_get_progname(argv[0]); args.list = NULL; Index: ssh-add.c =================================================================== RCS file: /cvs/openssh_cvs/ssh-add.c,v retrieving revision...
2024 Feb 08
12
[Bug 3666] New: sshd crash
https://bugzilla.mindrot.org/show_bug.cgi?id=3666 Bug ID: 3666 Summary: sshd crash Product: Portable OpenSSH Version: 8.2p1 Hardware: Other OS: Linux Status: NEW Severity: critical Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org Reporter:
2000 Oct 30
2
Minor fixes for openssh-SNAP-20001028
...-snap20001028/log-server.c Mon Oct 30 14:42:31 2000 @@ -46,7 +46,7 @@ #ifdef HAVE___PROGNAME extern char *__progname; #else /* HAVE___PROGNAME */ -static const char *__progname = "sshd"; +static const char *__progname = NULL; #endif /* HAVE___PROGNAME */ static LogLevel log_level = SYSLOG_LEVEL_INFO; @@ -118,6 +118,10 @@ exit(1); } log_on_stderr = on_stderr; + if (__progname == NULL) + __progname = av0; + if (! log_on_stderr) + openlog(__progname, LOG_PID, log_facility); } #define MSGBUFSIZ 1024
2002 Feb 05
3
COPY_SIZE #define
...] [-b batchfile] [-F config] [-o option] [-s subsystem|path]\n" - " [-S program] [user@]host[:file [file]]\n"); + " [-B bufsize] [-S program] [user@]host[:file [file]]\n"); exit(1); } @@ -122,8 +123,11 @@ main(int argc, char **argv) ll = SYSLOG_LEVEL_INFO; infile = stdin; /* Read from STDIN unless changed by -b */ - while ((ch = getopt(argc, argv, "1hvCo:s:S:b:F:")) != -1) { + while ((ch = getopt(argc, argv, "1hvCo:s:S:b:F:B:")) != -1) { switch (ch) { + case 'B': + COPY_SIZE = atoi(optarg); + break; case &...
2000 Aug 25
1
[patch] configurable ssh_prng_cmds
...and_file; /* globally def in ssh.h */ + goto parse_string; + default: fatal("process_config_line: Unimplemented opcode %d", opcode); } @@ -788,6 +795,8 @@ options->user_hostfile2 = SSH_USER_HOSTFILE2; if (options->log_level == (LogLevel) - 1) options->log_level = SYSLOG_LEVEL_INFO; + if (ssh_prng_command_file == NULL) + ssh_prng_command_file = xstrdup(SSH_PRNG_COMMAND_FILE); /* options->proxy_command should not be set by default */ /* options->user will be set in the main program if appropriate */ /* options->hostname will be set in the main pro...
2010 Mar 06
1
ssh-keyscan bug (not really exploitable)
...= 2; - if (lb->errfun) - (*lb->errfun)("linebuf (%s): realloc failed\n", - lb->filename); - return (NULL); - } - lb->buf = p; - } -} - static int fdlim_get(int hard) { @@ -709,8 +593,10 @@ int main(int argc, char **argv) { int debug_flag = 0, log_level = SYSLOG_LEVEL_INFO; - int opt, fopt_count = 0; - char *tname; + int opt, fopt_count = 0, j; + char *tname, *line; + size_t i, line_len; + FILE *fp; extern int optind; extern char *optarg; @@ -808,20 +694,52 @@ main(int argc, char **argv) read_wait_nfdset = howmany(maxfd, NFDBITS); read_wait = xcalloc(read_w...
2004 Jun 30
3
OpenSSL ENIGNE support for OpenSSH
Hi all, attached is a patch that enables using hardware crypto accelerators available through OpenSSL library for SSH operations. Especially in ssh/sshd it can bring a significant speed improvement. OTOH if no crypto engine is available, nothing bad happens and default software crypto routines are used. This patch is used in SUSE Linux OpenSSH package and proved to work (at least it didn't
2001 Jun 20
1
SFTP Logging Redux.
...+ + /* Initialize the parent process ID. */ + ppid = getppid(); + + /* Initialize the logfile, loglevel dependent on DEBUG compile-time setting. */ #ifdef DEBUG_SFTP_SERVER log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0); +#else + log_init("sftp-server", SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_AUTH, 0); #endif + /* Log session start. */ + log("(%d/%d/%s) SFTP session started.", ppid, cuid, CUNAME); + in = dup(STDIN_FILENO); out = dup(STDOUT_FILENO); @@ -1073,6 +1129,7 @@ if (select(max+1, rset, wset, NULL, NULL) < 0) { if (errno == EINTR)...